» » Power Electronics Manufacturer Semikron Targeted in Ransomware Attack

Power Electronics Manufacturer Semikron Targeted in Ransomware Attack

Power Electronics Manufacturer Semikron Targeted in Ransomware Attack

Residence › Cybercrime

Energy Electronics Producer Semikron Focused in Ransomware Assault

By Eduard Kovacs on August 03, 2022

Tweet

German energy electronics producer Semikron revealed this week that it has been focused in a cyberattack.

Semikron, which employs 3,000 folks throughout 24 subsidiaries worldwide, makes energy modules and methods. Its merchandise are utilized in motor drives, industrial automation methods, in addition to different utility areas.

In a discover posted on its web site on Monday, Semikron mentioned it had been focused by ‘knowledgeable hacker group’. The corporate mentioned the incident resulted within the partial encryption of IT methods and information.

In line with Semikron, the hackers claimed to have stolen information from its methods, which the corporate is at the moment working to substantiate.

No extra data has been shared by the corporate concerning the assault itself, however Bleeping Pc reported that the ransomware often called LV seems to have been concerned, with the attackers claiming to have stolen 2Tb of information from Semikron methods.

SecurityWeek has checked the Tor-based leak web site of the LV ransomware operation, however there may be at the moment no point out of Semikron. We did discover, nevertheless, that this isn’t the primary semiconductor firm focused by the hackers.

Semikron has been contacted for affirmation that the incident certainly concerned LV ransomware.

The LV ransomware emerged final 12 months, when researchers mentioned it seemed to be primarily based on the infamous REvil ransomware.

Associated: European Missile Maker MBDA Denies Hackers Breached Programs

Associated: Foxconn Confirms Ransomware Hit Manufacturing unit in Mexico

Associated: U.S. Semiconductor Maker MaxLinear Discloses Ransomware Assault

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Compliance Automation Startup RegScale Scores $20 Million Funding
  • Robinhood Crypto Penalized $30M for Violating NY Cybersecurity Rules
  • Energy Electronics Producer Semikron Focused in Ransomware Assault
  • Thoma Bravo to Purchase Ping Id for $2.eight Billion
  • Cybersecurity Financing Declined in Q2 2022, However Traders Optimistic
  • Cybersecurity M&A Roundup: 39 Offers Introduced in July 2022
  • Google Paid Out $90,000 for Vulnerabilities Patched by Chrome 104
  • The Ever-Rising Challenge of Cyber Threats – and the Zero Belief Reply
  • Practically $200 Million Stolen From Cryptocurrency Bridge Nomad
  • UK Clears Norton’s $8B Avast Cyber Safety Takeover

On the lookout for Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

The way to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles